Suspicious Process Created Via Wmic.EXE

Last updated on:

About the rule

Rule Type

Standard

Rule Description

Detects WMIC executing "process call create" with suspicious calls to processes such as "rundll32", "regsrv32", etc.

Severity

Trouble

Rule Requirement

Criteria

Action1: actionname = "Process started" AND (COMMANDLINE contains "process " AND COMMANDLINE contains "call " AND COMMANDLINE contains "create ") AND COMMANDLINE contains "rundll32,bitsadmin,regsvr32,cmd.exe /c ,cmd.exe /k ,cmd.exe /r ,cmd /c ,cmd /k ,cmd /r ,powershell,pwsh,certutil,cscript,wscript,mshta,\Users\Public\,\Windows\Temp\,\AppData\Local\,%temp%,%tmp%,%ProgramData%,%appdata%,%comspec%,%localappdata%" select Action1.HOSTNAME,Action1.MESSAGE,Action1.COMMANDLINE,Action1.FILE_NAME,Action1.PROCESSNAME,Action1.USERNAME,Action1.PARENTPROCESSNAME

Detection

Execution Mode

realtime

Log Sources

Windows

Author

Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems)